diff options
author | Robert Shih <robertshih@google.com> | 2020-01-28 19:57:08 -0800 |
---|---|---|
committer | android-build-merger <android-build-merger@google.com> | 2020-01-28 19:57:08 -0800 |
commit | bdfb1cc25761526edb3f2187c96a8a9e041c3694 (patch) | |
tree | 3bae7ac7050229ba2e169d17e870f594b448fc06 /drm | |
parent | 5c4b0e82a7dc21f3781fbe6a809fdfbcaacd85cc (diff) | |
parent | 8aa8655f24694f7651dc5708727a19df4a8132ad (diff) | |
download | platform_hardware_interfaces-bdfb1cc25761526edb3f2187c96a8a9e041c3694.tar.gz platform_hardware_interfaces-bdfb1cc25761526edb3f2187c96a8a9e041c3694.tar.bz2 platform_hardware_interfaces-bdfb1cc25761526edb3f2187c96a8a9e041c3694.zip |
Merge "drm vts 1.1 refactor"
am: 8aa8655f24
Change-Id: Icd678ddc89164dc76665ee5af4958cbf14294c34
Diffstat (limited to 'drm')
-rw-r--r-- | drm/1.1/vts/functional/Android.bp | 43 | ||||
-rw-r--r-- | drm/1.1/vts/functional/drm_hal_clearkey_test.cpp | 227 | ||||
-rw-r--r-- | drm/1.1/vts/functional/drm_hal_test_main.cpp | 52 | ||||
-rw-r--r-- | drm/1.1/vts/functional/include/android/hardware/drm/1.1/vts/drm_hal_clearkey_test.h | 209 |
4 files changed, 317 insertions, 214 deletions
diff --git a/drm/1.1/vts/functional/Android.bp b/drm/1.1/vts/functional/Android.bp index fb09563ada..e08d760ea4 100644 --- a/drm/1.1/vts/functional/Android.bp +++ b/drm/1.1/vts/functional/Android.bp @@ -14,21 +14,56 @@ // limitations under the License. // -cc_test { - name: "VtsHalDrmV1_1TargetTest", +cc_library_static { + name: "android.hardware.drm@1.1-vts", defaults: ["VtsHalTargetTestDefaults"], + include_dirs: [ + "hardware/interfaces/drm/1.0/vts/functional", + ], + local_include_dirs: [ + "include", + ], srcs: [ "drm_hal_clearkey_test.cpp", ], + shared_libs: [ + "android.hardware.drm@1.0", + "android.hardware.drm@1.1", + "android.hidl.allocator@1.0", + "android.hidl.memory@1.0", + "libhidlmemory", + "libnativehelper", + ], static_libs: [ + "libdrmvtshelper", + ], + export_shared_lib_headers: [ "android.hardware.drm@1.0", "android.hardware.drm@1.1", - "android.hardware.drm@1.0-helper", "android.hidl.allocator@1.0", "android.hidl.memory@1.0", "libhidlmemory", "libnativehelper", - "libssl", + ], + export_static_lib_headers: [ + "libdrmvtshelper", + ], + export_include_dirs: [ + "include", + ], +} + +cc_test { + name: "VtsHalDrmV1_1TargetTest", + defaults: ["VtsHalTargetTestDefaults"], + srcs: [ + "drm_hal_test_main.cpp", + ], + whole_static_libs: [ + "android.hardware.drm@1.1-vts" + ], + shared_libs: [ + "android.hardware.drm@1.1", ], test_suites: [ "general-tests", diff --git a/drm/1.1/vts/functional/drm_hal_clearkey_test.cpp b/drm/1.1/vts/functional/drm_hal_clearkey_test.cpp index bf99ef6cd8..fba973357d 100644 --- a/drm/1.1/vts/functional/drm_hal_clearkey_test.cpp +++ b/drm/1.1/vts/functional/drm_hal_clearkey_test.cpp @@ -16,205 +16,20 @@ #define LOG_TAG "drm_hal_clearkey_test@1.1" -#include <android/hardware/drm/1.0/ICryptoPlugin.h> -#include <android/hardware/drm/1.0/IDrmPlugin.h> -#include <android/hardware/drm/1.0/types.h> -#include <android/hardware/drm/1.1/ICryptoFactory.h> -#include <android/hardware/drm/1.1/IDrmFactory.h> -#include <android/hardware/drm/1.1/IDrmPlugin.h> -#include <android/hardware/drm/1.1/types.h> -#include <android/hidl/allocator/1.0/IAllocator.h> -#include <android/hidl/manager/1.2/IServiceManager.h> -#include <gtest/gtest.h> -#include <hidl/GtestPrinter.h> -#include <hidl/HidlSupport.h> -#include <hidl/ServiceManagement.h> -#include <hidlmemory/mapping.h> #include <log/log.h> -#include <openssl/aes.h> -#include <memory> -#include <random> - -namespace drm = ::android::hardware::drm; -using ::android::hardware::drm::V1_0::BufferType; -using ::android::hardware::drm::V1_0::DestinationBuffer; -using ::android::hardware::drm::V1_0::ICryptoPlugin; -using ::android::hardware::drm::V1_0::KeyedVector; -using ::android::hardware::drm::V1_0::KeyValue; -using ::android::hardware::drm::V1_0::KeyType; -using ::android::hardware::drm::V1_0::Mode; -using ::android::hardware::drm::V1_0::Pattern; -using ::android::hardware::drm::V1_0::SecureStop; -using ::android::hardware::drm::V1_0::SecureStopId; -using ::android::hardware::drm::V1_0::SessionId; -using ::android::hardware::drm::V1_0::SharedBuffer; -using ::android::hardware::drm::V1_0::Status; -using ::android::hardware::drm::V1_0::SubSample; -using ::android::hardware::drm::V1_0::SubSample; - -using ::android::hardware::drm::V1_1::DrmMetricGroup; -using ::android::hardware::drm::V1_1::HdcpLevel; -using ::android::hardware::drm::V1_1::ICryptoFactory; -using ::android::hardware::drm::V1_1::IDrmFactory; -using ::android::hardware::drm::V1_1::IDrmPlugin; -using ::android::hardware::drm::V1_1::KeyRequestType; -using ::android::hardware::drm::V1_1::SecureStopRelease; -using ::android::hardware::drm::V1_1::SecurityLevel; -using ::android::hardware::drm::V1_1::SecurityLevel; - -using ::android::hardware::hidl_array; -using ::android::hardware::hidl_string; -using ::android::hardware::hidl_memory; -using ::android::hardware::hidl_vec; -using ::android::hardware::Return; -using ::android::hidl::allocator::V1_0::IAllocator; -using ::android::hidl::memory::V1_0::IMemory; -using ::android::sp; - -using std::string; -using std::unique_ptr; -using std::random_device; -using std::map; -using std::mt19937; -using std::vector; - -/** - * These clearkey tests use white box knowledge of the legacy clearkey - * plugin to verify that the HIDL HAL services and interfaces are working. - * It is not intended to verify any vendor's HAL implementation. If you - * are looking for vendor HAL tests, see drm_hal_vendor_test.cpp - */ -#define ASSERT_OK(ret) ASSERT_TRUE(ret.isOk()) -#define EXPECT_OK(ret) EXPECT_TRUE(ret.isOk()) - -// To be used in mpd to specify drm scheme for players -static const uint8_t kClearKeyUUID[16] = { +#include <vector> + +#include "android/hardware/drm/1.1/vts/drm_hal_clearkey_test.h" + +namespace android { +namespace hardware { +namespace drm { +namespace V1_1 { +namespace vts { + +const uint8_t kClearKeyUUID[16] = { 0xE2, 0x71, 0x9D, 0x58, 0xA9, 0x85, 0xB3, 0xC9, - 0x78, 0x1A, 0xB0, 0x30, 0xAF, 0x78, 0xD3, 0x0E}; - -class DrmHalClearkeyTest : public ::testing::TestWithParam<std::string> { - public: - void SetUp() override { - const ::testing::TestInfo* const test_info = - ::testing::UnitTest::GetInstance()->current_test_info(); - - ALOGD("DrmHalClearkeyTest: Running test %s.%s", test_info->test_case_name(), - test_info->name()); - - const std::string instance = GetParam(); - - sp<IDrmFactory> drmFactory = IDrmFactory::getService(instance); - drmPlugin = createDrmPlugin(drmFactory); - sp<ICryptoFactory> cryptoFactory = ICryptoFactory::getService(instance); - cryptoPlugin = createCryptoPlugin(cryptoFactory); - - if (drmPlugin == nullptr || cryptoPlugin == nullptr) { - if (instance == "clearkey") { - ASSERT_NE(nullptr, drmPlugin.get()) << "Can't get clearkey drm@1.1 plugin"; - ASSERT_NE(nullptr, cryptoPlugin.get()) << "Can't get clearkey crypto@1.1 plugin"; - } - GTEST_SKIP() << "Instance does not support clearkey"; - } - } - - SessionId openSession(); - SessionId openSession(SecurityLevel level); - void closeSession(const SessionId& sessionId); - hidl_vec<uint8_t> loadKeys(const SessionId& sessionId, const KeyType& type); - - private: - sp<IDrmPlugin> createDrmPlugin(sp<IDrmFactory> drmFactory) { - if (drmFactory == nullptr) { - return nullptr; - } - sp<IDrmPlugin> plugin = nullptr; - auto res = drmFactory->createPlugin( - kClearKeyUUID, "", [&](Status status, const sp<drm::V1_0::IDrmPlugin>& pluginV1_0) { - EXPECT_EQ(Status::OK == status, pluginV1_0 != nullptr); - plugin = IDrmPlugin::castFrom(pluginV1_0); - }); - - if (!res.isOk()) { - ALOGE("createDrmPlugin remote call failed"); - } - return plugin; - } - - sp<ICryptoPlugin> createCryptoPlugin(sp<ICryptoFactory> cryptoFactory) { - if (cryptoFactory == nullptr) { - return nullptr; - } - sp<ICryptoPlugin> plugin = nullptr; - hidl_vec<uint8_t> initVec; - auto res = cryptoFactory->createPlugin( - kClearKeyUUID, initVec, - [&](Status status, const sp<drm::V1_0::ICryptoPlugin>& pluginV1_0) { - EXPECT_EQ(Status::OK == status, pluginV1_0 != nullptr); - plugin = pluginV1_0; - }); - if (!res.isOk()) { - ALOGE("createCryptoPlugin remote call failed"); - } - return plugin; - } - -protected: - template <typename CT> - bool ValueEquals(DrmMetricGroup::ValueType type, const std::string& expected, const CT& actual) { - return type == DrmMetricGroup::ValueType::STRING_TYPE && expected == actual.stringValue; - } - - template <typename CT> - bool ValueEquals(DrmMetricGroup::ValueType type, const int64_t expected, const CT& actual) { - return type == DrmMetricGroup::ValueType::INT64_TYPE && expected == actual.int64Value; - } - - template <typename CT> - bool ValueEquals(DrmMetricGroup::ValueType type, const double expected, const CT& actual) { - return type == DrmMetricGroup::ValueType::DOUBLE_TYPE && expected == actual.doubleValue; - } - - template <typename AT, typename VT> - bool ValidateMetricAttributeAndValue(const DrmMetricGroup::Metric& metric, - const std::string& attributeName, const AT& attributeValue, - const std::string& componentName, const VT& componentValue) { - bool validAttribute = false; - bool validComponent = false; - for (const DrmMetricGroup::Attribute& attribute : metric.attributes) { - if (attribute.name == attributeName && - ValueEquals(attribute.type, attributeValue, attribute)) { - validAttribute = true; - } - } - for (const DrmMetricGroup::Value& value : metric.values) { - if (value.componentName == componentName && - ValueEquals(value.type, componentValue, value)) { - validComponent = true; - } - } - return validAttribute && validComponent; - } - - template <typename AT, typename VT> - bool ValidateMetricAttributeAndValue(const hidl_vec<DrmMetricGroup>& metricGroups, - const std::string& metricName, - const std::string& attributeName, const AT& attributeValue, - const std::string& componentName, const VT& componentValue) { - bool foundMetric = false; - for (const auto& group : metricGroups) { - for (const auto& metric : group.metrics) { - if (metric.name == metricName) { - foundMetric = foundMetric || ValidateMetricAttributeAndValue( - metric, attributeName, attributeValue, - componentName, componentValue); - } - } - } - return foundMetric; - } - - sp<IDrmPlugin> drmPlugin; - sp<ICryptoPlugin> cryptoPlugin; + 0x78, 0x1A, 0xB0, 0x30, 0xAF, 0x78, 0xD3, 0x0E }; /** @@ -812,16 +627,8 @@ TEST_P(DrmHalClearkeyTest, RemoveSecureStopById) { EXPECT_OK(res); } -static const std::set<std::string> kAllInstances = [] { - std::vector<std::string> drmInstances = - android::hardware::getAllHalInstanceNames(IDrmFactory::descriptor); - std::vector<std::string> cryptoInstances = - android::hardware::getAllHalInstanceNames(ICryptoFactory::descriptor); - std::set<std::string> allInstances; - allInstances.insert(drmInstances.begin(), drmInstances.end()); - allInstances.insert(cryptoInstances.begin(), cryptoInstances.end()); - return allInstances; -}(); - -INSTANTIATE_TEST_SUITE_P(PerInstance, DrmHalClearkeyTest, testing::ValuesIn(kAllInstances), - android::hardware::PrintInstanceNameToString); +} // namespace vts +} // namespace V1_1 +} // namespace drm +} // namespace hardware +} // namespace android diff --git a/drm/1.1/vts/functional/drm_hal_test_main.cpp b/drm/1.1/vts/functional/drm_hal_test_main.cpp new file mode 100644 index 0000000000..c6965bdc39 --- /dev/null +++ b/drm/1.1/vts/functional/drm_hal_test_main.cpp @@ -0,0 +1,52 @@ +/* + * Copyright (C) 2020 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#include <gtest/gtest.h> +#include <hidl/HidlSupport.h> +#include <hidl/ServiceManagement.h> + +#include <algorithm> +#include <iterator> +#include <set> +#include <string> +#include <utility> +#include <vector> + +#include "android/hardware/drm/1.1/vts/drm_hal_clearkey_test.h" + +using android::hardware::drm::V1_1::ICryptoFactory; +using android::hardware::drm::V1_1::IDrmFactory; +using android::hardware::drm::V1_1::vts::DrmHalClearkeyTest; +using android::hardware::drm::V1_1::vts::kClearKeyUUID; + +static const std::vector<DrmHalTestParam> kAllInstances = [] { + std::vector<std::string> drmInstances = + android::hardware::getAllHalInstanceNames(IDrmFactory::descriptor); + std::vector<std::string> cryptoInstances = + android::hardware::getAllHalInstanceNames(ICryptoFactory::descriptor); + std::set<std::string> allInstances; + allInstances.insert(drmInstances.begin(), drmInstances.end()); + allInstances.insert(cryptoInstances.begin(), cryptoInstances.end()); + + std::vector<DrmHalTestParam> allInstancesWithClearKeyUuid; + std::transform(allInstances.begin(), allInstances.end(), + std::back_inserter(allInstancesWithClearKeyUuid), + [](std::string s) { return DrmHalTestParam(s, kClearKeyUUID); }); + return allInstancesWithClearKeyUuid; +}(); + +INSTANTIATE_TEST_SUITE_P(PerInstance, DrmHalClearkeyTest, testing::ValuesIn(kAllInstances), + PrintParamInstanceToString); diff --git a/drm/1.1/vts/functional/include/android/hardware/drm/1.1/vts/drm_hal_clearkey_test.h b/drm/1.1/vts/functional/include/android/hardware/drm/1.1/vts/drm_hal_clearkey_test.h new file mode 100644 index 0000000000..e21a2c135c --- /dev/null +++ b/drm/1.1/vts/functional/include/android/hardware/drm/1.1/vts/drm_hal_clearkey_test.h @@ -0,0 +1,209 @@ +/* + * Copyright (C) 2020 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#ifndef V1_1_DRM_HAL_CLEARKEY_TEST_H +#define V1_1_DRM_HAL_CLEARKEY_TEST_H + +#include <android/hardware/drm/1.0/ICryptoPlugin.h> +#include <android/hardware/drm/1.0/IDrmPlugin.h> +#include <android/hardware/drm/1.0/types.h> +#include <android/hardware/drm/1.1/ICryptoFactory.h> +#include <android/hardware/drm/1.1/IDrmFactory.h> +#include <android/hardware/drm/1.1/IDrmPlugin.h> +#include <android/hardware/drm/1.1/types.h> +#include <android/hidl/allocator/1.0/IAllocator.h> +#include <android/hidl/manager/1.2/IServiceManager.h> + +#include <gtest/gtest.h> +#include <hidl/HidlSupport.h> +#include <hidl/ServiceManagement.h> +#include <log/log.h> + +#include <string> + +#include "drm_vts_helper.h" + +namespace drm = ::android::hardware::drm; + +using ::android::hidl::allocator::V1_0::IAllocator; +using ::android::hidl::memory::V1_0::IMemory; + +using drm_vts::DrmHalTestParam; +using drm_vts::PrintParamInstanceToString; + +/** + * These clearkey tests use white box knowledge of the legacy clearkey + * plugin to verify that the HIDL HAL services and interfaces are working. + * It is not intended to verify any vendor's HAL implementation. If you + * are looking for vendor HAL tests, see drm_hal_vendor_test.cpp + */ +#define ASSERT_OK(ret) ASSERT_TRUE(ret.isOk()) +#define EXPECT_OK(ret) EXPECT_TRUE(ret.isOk()) + +namespace android { +namespace hardware { +namespace drm { +namespace V1_1 { +namespace vts { + +using ::android::hardware::drm::V1_0::ICryptoPlugin; +using ::android::hardware::drm::V1_0::KeyedVector; +using ::android::hardware::drm::V1_0::KeyType; +using ::android::hardware::drm::V1_0::Mode; +using ::android::hardware::drm::V1_0::Pattern; +using ::android::hardware::drm::V1_0::SecureStop; +using ::android::hardware::drm::V1_0::SecureStopId; +using ::android::hardware::drm::V1_0::SessionId; +using ::android::hardware::drm::V1_0::Status; + +// To be used in mpd to specify drm scheme for players +extern const uint8_t kClearKeyUUID[16]; + +class DrmHalClearkeyTest : public ::testing::TestWithParam<DrmHalTestParam> { + public: + void SetUp() override { + const ::testing::TestInfo* const test_info = + ::testing::UnitTest::GetInstance()->current_test_info(); + + ALOGD("DrmHalClearkeyTest: Running test %s.%s", test_info->test_case_name(), + test_info->name()); + + const std::string instance = GetParam().instance_; + + sp<IDrmFactory> drmFactory = IDrmFactory::getService(instance); + if (!drmFactory->isCryptoSchemeSupported(kClearKeyUUID)) { + GTEST_SKIP() << instance << " does not support clearkey"; + } + drmPlugin = createDrmPlugin(drmFactory); + sp<ICryptoFactory> cryptoFactory = ICryptoFactory::getService(instance); + cryptoPlugin = createCryptoPlugin(cryptoFactory); + + if (drmPlugin == nullptr || cryptoPlugin == nullptr) { + if (instance == "clearkey") { + ASSERT_NE(nullptr, drmPlugin.get()) << "Can't get clearkey drm@1.1 plugin"; + ASSERT_NE(nullptr, cryptoPlugin.get()) << "Can't get clearkey crypto@1.1 plugin"; + } + GTEST_SKIP() << "Instance does not support clearkey"; + } + } + + SessionId openSession(); + SessionId openSession(SecurityLevel level); + void closeSession(const SessionId& sessionId); + hidl_vec<uint8_t> loadKeys(const SessionId& sessionId, const KeyType& type); + + private: + sp<IDrmPlugin> createDrmPlugin(sp<IDrmFactory> drmFactory) { + if (drmFactory == nullptr) { + return nullptr; + } + sp<IDrmPlugin> plugin = nullptr; + auto res = drmFactory->createPlugin(GetParam().scheme_, "", + [&](Status status, const sp<drm::V1_0::IDrmPlugin>& pluginV1_0) { + EXPECT_EQ(Status::OK == status, pluginV1_0 != nullptr); + plugin = IDrmPlugin::castFrom(pluginV1_0); + }); + + if (!res.isOk()) { + ALOGE("createDrmPlugin remote call failed"); + } + return plugin; + } + + sp<ICryptoPlugin> createCryptoPlugin(sp<ICryptoFactory> cryptoFactory) { + if (cryptoFactory == nullptr) { + return nullptr; + } + sp<ICryptoPlugin> plugin = nullptr; + hidl_vec<uint8_t> initVec; + auto res = cryptoFactory->createPlugin( + GetParam().scheme_, initVec, + [&](Status status, const sp<drm::V1_0::ICryptoPlugin>& pluginV1_0) { + EXPECT_EQ(Status::OK == status, pluginV1_0 != nullptr); + plugin = pluginV1_0; + }); + if (!res.isOk()) { + ALOGE("createCryptoPlugin remote call failed"); + } + return plugin; + } + +protected: + template <typename CT> + bool ValueEquals(DrmMetricGroup::ValueType type, const std::string& expected, const CT& actual) { + return type == DrmMetricGroup::ValueType::STRING_TYPE && expected == actual.stringValue; + } + + template <typename CT> + bool ValueEquals(DrmMetricGroup::ValueType type, const int64_t expected, const CT& actual) { + return type == DrmMetricGroup::ValueType::INT64_TYPE && expected == actual.int64Value; + } + + template <typename CT> + bool ValueEquals(DrmMetricGroup::ValueType type, const double expected, const CT& actual) { + return type == DrmMetricGroup::ValueType::DOUBLE_TYPE && expected == actual.doubleValue; + } + + template <typename AT, typename VT> + bool ValidateMetricAttributeAndValue(const DrmMetricGroup::Metric& metric, + const std::string& attributeName, const AT& attributeValue, + const std::string& componentName, const VT& componentValue) { + bool validAttribute = false; + bool validComponent = false; + for (const DrmMetricGroup::Attribute& attribute : metric.attributes) { + if (attribute.name == attributeName && + ValueEquals(attribute.type, attributeValue, attribute)) { + validAttribute = true; + } + } + for (const DrmMetricGroup::Value& value : metric.values) { + if (value.componentName == componentName && + ValueEquals(value.type, componentValue, value)) { + validComponent = true; + } + } + return validAttribute && validComponent; + } + + template <typename AT, typename VT> + bool ValidateMetricAttributeAndValue(const hidl_vec<DrmMetricGroup>& metricGroups, + const std::string& metricName, + const std::string& attributeName, const AT& attributeValue, + const std::string& componentName, const VT& componentValue) { + bool foundMetric = false; + for (const auto& group : metricGroups) { + for (const auto& metric : group.metrics) { + if (metric.name == metricName) { + foundMetric = foundMetric || ValidateMetricAttributeAndValue( + metric, attributeName, attributeValue, + componentName, componentValue); + } + } + } + return foundMetric; + } + + sp<IDrmPlugin> drmPlugin; + sp<ICryptoPlugin> cryptoPlugin; +}; + +} // namespace vts +} // namespace V1_1 +} // namespace drm +} // namespace hardware +} // namespace android + +#endif // V1_1_DRM_HAL_CLEARKEY_TEST_H |